Cats in My Certificate Transparency Logs

Cats in My Certificate Transparency Logs

Security BSides San Francisco via YouTube Direct link

How SCT logs can be abused

9 of 23

9 of 23

How SCT logs can be abused

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cats in My Certificate Transparency Logs

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Alice and Bob
  3. 3 Certificate Authorities
  4. 4 Cats
  5. 5 Certificate Transparency
  6. 6 What is a CT Log
  7. 7 How does a CT Log protect us
  8. 8 What is an SCT
  9. 9 How SCT logs can be abused
  10. 10 Public keys
  11. 11 Persistent data storage
  12. 12 Example
  13. 13 Chunking
  14. 14 Catalog
  15. 15 Demo
  16. 16 Who is this person
  17. 17 Summary
  18. 18 Entropy
  19. 19 Googlecom
  20. 20 Multidomain ProPer
  21. 21 Wrap Up
  22. 22 Final Thoughts
  23. 23 Outro

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.